首页 > 最新文献

2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)最新文献

英文 中文
A Novel Approach to Mobile Indoor Navigation Systems 移动室内导航系统的新方法
Madi Zhanbyrtayev, Bekzhan Kassenov
GPS (Global Positioning System) is used to determinethe position of an outdoor user with a high degree of accuracy,but it works poorly or not at all in indoor locations.Many different techniques have been proposed for indoorpositioning, including reference points, such as NFC tags orBluetooth beacons, radio signal triangulation, and patternor image recognition [3, 6]. Any of these techniques canbe combined with each other or with a dead-reckoning approach,adding user movement data from sensors, in orderto arrive at a more precise position estimate [3]. Indoor navigationuser interfaces are essentially the same as those usedoutdoors: maps, turn-by-turn directions, and augmented reality.
GPS(全球定位系统)用于确定户外用户的位置,精度很高,但在室内位置效果很差或根本不起作用。已经提出了许多不同的室内定位技术,包括参考点,如NFC标签或蓝牙信标,无线电信号三角测量和模式图像识别[3,6]。这些技术中的任何一种都可以相互结合或与航位推算方法相结合,添加来自传感器的用户运动数据,以达到更精确的位置估计。室内导航用户界面本质上与室外相同:地图、逐向导航和增强现实。
{"title":"A Novel Approach to Mobile Indoor Navigation Systems","authors":"Madi Zhanbyrtayev, Bekzhan Kassenov","doi":"10.1145/2897073.2897131","DOIUrl":"https://doi.org/10.1145/2897073.2897131","url":null,"abstract":"GPS (Global Positioning System) is used to determinethe position of an outdoor user with a high degree of accuracy,but it works poorly or not at all in indoor locations.Many different techniques have been proposed for indoorpositioning, including reference points, such as NFC tags orBluetooth beacons, radio signal triangulation, and patternor image recognition [3, 6]. Any of these techniques canbe combined with each other or with a dead-reckoning approach,adding user movement data from sensors, in orderto arrive at a more precise position estimate [3]. Indoor navigationuser interfaces are essentially the same as those usedoutdoors: maps, turn-by-turn directions, and augmented reality.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132626376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Middleware for Writing Distributed Applications on Physical Computing Devices 在物理计算设备上编写分布式应用程序的中间件
Michael Lescisin, Q. Mahmoud
A computer program, at its most basic level is a series of low level processor instructions which are executed sequentially. These instructions take time to execute, thus longer programs have longer execution times. One way to decrease the execution time for a program is to decrease the required time for each instruction. This is called frequency scaling. The disadvantage of frequency scaling is that running a processor at higher speeds causes it to generate more heat and consume more power. The physical properties of transistors also impose limits on how fast a microprocessor can be built. The solution to the problem of frequency scaling is to, instead of decreasing the time to execute an instruction, increase the number of instructions that can be run in a given amount of time, by running these instructions in parallel. This is known as parallel computing, and in this paper we present a solution for using many off-the-shelf computers to build a computing cluster which will accelerate computing performance by running tasks in parallel. To this end, we introduce a middleware for writing distributed applications on physical computing devices, such as the Raspberry Pi computer.
最基本的计算机程序是一系列按顺序执行的低级处理器指令。这些指令的执行需要时间,因此较长的程序需要较长的执行时间。减少程序执行时间的一种方法是减少每条指令所需的时间。这就是所谓的频率缩放。频率扩展的缺点是,以更高的速度运行处理器会产生更多的热量,消耗更多的电能。晶体管的物理特性也限制了微处理器的运行速度。解决频率扩展问题的办法是,通过并行运行指令,增加在给定时间内可运行的指令数量,而不是减少执行指令的时间。这就是所谓的并行计算,在本文中,我们提出了一种解决方案,利用许多现成的计算机来构建一个计算集群,通过并行运行任务来加速计算性能。为此,我们引入了一个中间件,用于在树莓派电脑等物理计算设备上编写分布式应用程序。
{"title":"Middleware for Writing Distributed Applications on Physical Computing Devices","authors":"Michael Lescisin, Q. Mahmoud","doi":"10.1145/2897073.2897123","DOIUrl":"https://doi.org/10.1145/2897073.2897123","url":null,"abstract":"A computer program, at its most basic level is a series of low level processor instructions which are executed sequentially. These instructions take time to execute, thus longer programs have longer execution times. One way to decrease the execution time for a program is to decrease the required time for each instruction. This is called frequency scaling. The disadvantage of frequency scaling is that running a processor at higher speeds causes it to generate more heat and consume more power. The physical properties of transistors also impose limits on how fast a microprocessor can be built. The solution to the problem of frequency scaling is to, instead of decreasing the time to execute an instruction, increase the number of instructions that can be run in a given amount of time, by running these instructions in parallel. This is known as parallel computing, and in this paper we present a solution for using many off-the-shelf computers to build a computing cluster which will accelerate computing performance by running tasks in parallel. To this end, we introduce a middleware for writing distributed applications on physical computing devices, such as the Raspberry Pi computer.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126951393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling Free-Form Handwriting Gesture User Authentication for Android Smartphones Android智能手机自由形式手写手势用户认证建模
Floren Alexis T. Espinosa, G. Guerrero, L. Vea
Smartphones nowadays are customized to help users with their daily tasks such as storing important data or making transactions through the internet. With the sensitivity of the data involved, authentication mechanism such as fixed-text password, PIN, or unlock patterns are used to safeguard these data against intruders. However, these mechanisms have the risk from security threats such as cracking or shoulder surfing. To enhance mobile and/or information security, this study aimed to develop a free-form handwriting gesture user authentication for smartphones. It also tried to discover the static and dynamic handwriting features that significantly influence the recognition of a legitimate user. The experiment was then conducted by asking thirty (30) individuals to draw or swipe using their fingertip their desired free-form security pattern ten (10) times. These patterns were then cleaned and processed, and extracted seven (7) static and eleven (11) dynamic handwriting features. By means of Neural Network classifier of the RapidMiner data mining tool, these features were used to develop, validate, and test a model for user authentication. The model showed a very promising recognition rate of 96.67%. The model is further tested through a prototype, and it still gave a very satisfactory result.
现在的智能手机是定制的,以帮助用户完成日常任务,如存储重要数据或通过互联网进行交易。由于所涉及数据的敏感性,使用诸如固定文本密码、PIN或解锁模式之类的身份验证机制来保护这些数据不受入侵者的侵害。然而,这些机制存在来自安全威胁的风险,例如破裂或肩部冲浪。为了加强移动和/或信息安全,本研究旨在为智能手机开发一种自由形式的手写手势用户认证。它还试图发现显著影响合法用户识别的静态和动态手写特征。实验要求30个人用他们的指尖画出或滑动他们想要的自由形式的安全图案10次。然后对这些图案进行清洗和处理,并提取出7个静态和11个动态笔迹特征。通过RapidMiner数据挖掘工具的神经网络分类器,利用这些特征来开发、验证和测试用户身份验证模型。该模型的识别率为96.67%。通过样机对模型进行了进一步的测试,得到了令人满意的结果。
{"title":"Modeling Free-Form Handwriting Gesture User Authentication for Android Smartphones","authors":"Floren Alexis T. Espinosa, G. Guerrero, L. Vea","doi":"10.1145/2897073.2897095","DOIUrl":"https://doi.org/10.1145/2897073.2897095","url":null,"abstract":"Smartphones nowadays are customized to help users with their daily tasks such as storing important data or making transactions through the internet. With the sensitivity of the data involved, authentication mechanism such as fixed-text password, PIN, or unlock patterns are used to safeguard these data against intruders. However, these mechanisms have the risk from security threats such as cracking or shoulder surfing. To enhance mobile and/or information security, this study aimed to develop a free-form handwriting gesture user authentication for smartphones. It also tried to discover the static and dynamic handwriting features that significantly influence the recognition of a legitimate user. The experiment was then conducted by asking thirty (30) individuals to draw or swipe using their fingertip their desired free-form security pattern ten (10) times. These patterns were then cleaned and processed, and extracted seven (7) static and eleven (11) dynamic handwriting features. By means of Neural Network classifier of the RapidMiner data mining tool, these features were used to develop, validate, and test a model for user authentication. The model showed a very promising recognition rate of 96.67%. The model is further tested through a prototype, and it still gave a very satisfactory result.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Regression Test Selection for Android Applications Android应用的回归测试选择
Q. Do, Guowei Yang, Meiru Che, Darren Hui, J. Ridgeway
Mobile platform pervades human life, and much research in recent years has focused on improving the reliability of mobile applications on this platform, for example by applying automatic testing. However, researchers have primarily considered testing of single version of mobile applications. Although regression testing has been extensively studied for desktop applications, the approaches for desktop applications cannot be directly applied to mobile applications. Our approach leverages the combination of static impact analysis and dynamic code coverage information, and identifies a subset of test cases for re-execution on the modified app version. We implement our approach for Android apps, and illustrate its usefulness based on an Android application.
移动平台已经渗透到人们的生活中,近年来的许多研究都集中在提高移动应用程序在这个平台上的可靠性上,例如通过应用自动测试。然而,研究人员主要考虑的是测试单一版本的移动应用程序。虽然回归测试在桌面应用程序中得到了广泛的研究,但是桌面应用程序的方法不能直接应用于移动应用程序。我们的方法利用了静态影响分析和动态代码覆盖信息的组合,并确定了测试用例的子集,以便在修改后的应用程序版本上重新执行。我们在Android应用程序中实现了我们的方法,并基于Android应用程序说明了它的实用性。
{"title":"Regression Test Selection for Android Applications","authors":"Q. Do, Guowei Yang, Meiru Che, Darren Hui, J. Ridgeway","doi":"10.1145/2897073.2897127","DOIUrl":"https://doi.org/10.1145/2897073.2897127","url":null,"abstract":"Mobile platform pervades human life, and much research in recent years has focused on improving the reliability of mobile applications on this platform, for example by applying automatic testing. However, researchers have primarily considered testing of single version of mobile applications. Although regression testing has been extensively studied for desktop applications, the approaches for desktop applications cannot be directly applied to mobile applications. Our approach leverages the combination of static impact analysis and dynamic code coverage information, and identifies a subset of test cases for re-execution on the modified app version. We implement our approach for Android apps, and illustrate its usefulness based on an Android application.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Pinpointing Mobile Malware Using Code Analysis 使用代码分析精确定位移动恶意软件
Omer Tripp, Marco Pistoia, Pietro Ferrara, J. Rubin
Mobile malware has recently become an acute problem. Existing solutions either base static reasoning on syntactic properties, such as exception handlers or configuration fields, or compute data-flow reachability over the program, which leads to scalability challenges. We explore a new and complementary category of features, which strikes a middleground between the above two categories. This new category focuses on security-relevant operations (communcation, lifecycle, etc) --- and in particular, their multiplicity and happens-before order --- as a means to distinguish between malicious and benign applications. Computing these features requires semantic, yet lightweight, modeling of the program's behavior. We have created a malware detection system for Android, MassDroid, that collects traces of security-relevant operations from the call graph via a scalable form of data-flow analysis. These are reduced to happens-before and multiplicity features, then fed into a supervised learning engine to obtain a malicious/benign classification. MassDroid also embodies a novel reporting interface, containing pointers into the code that serve as evidence supporting the determination. We have applied MassDroid to 35,000 Android apps from the wild. The results are highly encouraging with an F-score of 95% in standard testing, and >90% when applied to previously unseen malware signatures. MassDroid is also efficient, requiring about two minutes per app. MassDroid is publicly available as a cloud service for malware detection.
手机恶意软件最近已经成为一个严重的问题。现有的解决方案要么基于语法属性(如异常处理程序或配置字段)的静态推理,要么计算程序上的数据流可达性,这将导致可伸缩性方面的挑战。我们探索了一种新的、互补的特征类别,它介于上述两类之间。这个新类别侧重于与安全相关的操作(通信、生命周期等)——特别是它们的多样性和发生顺序——作为区分恶意和良性应用程序的一种手段。计算这些特性需要对程序的行为进行语义的、轻量级的建模。我们已经为Android创建了一个恶意软件检测系统,MassDroid,它通过可扩展的数据流分析形式从调用图中收集安全相关操作的痕迹。这些特征被简化为发生前和多重特征,然后输入监督学习引擎以获得恶意/良性分类。MassDroid还包含一个新颖的报告接口,其中包含指向代码的指针,作为支持判断的证据。我们已经将MassDroid应用于3.5万个Android应用。结果非常令人鼓舞,在标准测试中f得分为95%,并且在应用于以前未见过的恶意软件签名时>90%。MassDroid的效率也很高,每个应用大约需要两分钟。MassDroid作为恶意软件检测的云服务公开提供。
{"title":"Pinpointing Mobile Malware Using Code Analysis","authors":"Omer Tripp, Marco Pistoia, Pietro Ferrara, J. Rubin","doi":"10.1145/2897073.2897707","DOIUrl":"https://doi.org/10.1145/2897073.2897707","url":null,"abstract":"Mobile malware has recently become an acute problem. Existing solutions either base static reasoning on syntactic properties, such as exception handlers or configuration fields, or compute data-flow reachability over the program, which leads to scalability challenges. We explore a new and complementary category of features, which strikes a middleground between the above two categories. This new category focuses on security-relevant operations (communcation, lifecycle, etc) --- and in particular, their multiplicity and happens-before order --- as a means to distinguish between malicious and benign applications. Computing these features requires semantic, yet lightweight, modeling of the program's behavior. We have created a malware detection system for Android, MassDroid, that collects traces of security-relevant operations from the call graph via a scalable form of data-flow analysis. These are reduced to happens-before and multiplicity features, then fed into a supervised learning engine to obtain a malicious/benign classification. MassDroid also embodies a novel reporting interface, containing pointers into the code that serve as evidence supporting the determination. We have applied MassDroid to 35,000 Android apps from the wild. The results are highly encouraging with an F-score of 95% in standard testing, and >90% when applied to previously unseen malware signatures. MassDroid is also efficient, requiring about two minutes per app. MassDroid is publicly available as a cloud service for malware detection.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130408857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated Re-factoring of Android Apps to Enhance Energy-Efficiency 自动重构Android应用程序,提高能源效率
Abhijeet Banerjee, Abhik Roychoudhury
Mobile devices, such as smartphones and tablets, are energy constrained by nature. Therefore, apps targeted for such platforms must be energy-efficient. However, due to the use of energy oblivious design practices often this is not the case. In this paper, we present a light-weight re-factoring technique that can assist in energy-aware app development. Our technique relies on a set of energy-efficiency guidelines that encodes the optimal usage of energy-intensive (hardware) resources in an app. Given a prototype for an app, our technique begins by generating a design-expression for it. A design-expression can be described as a regular-expression representing the ordering of energy-intensive resource usages and invocation of key functionalities (event-handlers) within the app. It also generates a set of defect-expressions that are design-expressions representing the negation of energy-efficiency guidelines. A non-empty intersection between an app’s design-expression and a defect expression indicates violation of a guideline (and therefore, potential for re-factoring). To evaluate the efficacy of our re-factoring technique we analyzed a suite of open-source Android apps using our technique. The resultant re-factoring when applied reduced the energy-consumption of these apps between 3 % to 29 %. We also present a case study for one of our subject apps, that captures its design evolution over a period of two-years and more than 200 commits. Our framework found re-factoring opportunities in a number of these commits, that could have been implemented earlier on in the development stages had the developer used an energy-aware re-factoring technique such as the one presented in this work.
移动设备,如智能手机和平板电脑,受到自然能源的限制。因此,针对这些平台的应用程序必须是节能的。然而,由于使用无关能量的设计实践,通常情况并非如此。在本文中,我们提出了一种轻量级重构技术,可以帮助节能应用程序开发。我们的技术依赖于一套能源效率准则,该准则对应用程序中能源密集型(硬件)资源的最佳使用进行编码。给定应用程序的原型,我们的技术首先为其生成设计表达。设计表达式可以被描述为正则表达式,表示应用程序中能源密集型资源使用的顺序和关键功能(事件处理程序)的调用。它还生成一组缺陷表达式,这些缺陷表达式是设计表达式,表示对能源效率准则的否定。应用程序的设计表达式和缺陷表达式之间的非空交集表明违反了指导原则(因此,有可能进行重构)。为了评估我们重构技术的效果,我们分析了一组使用我们技术的开源Android应用。由此产生的重构使这些应用的能耗减少了3%到29%。我们还为我们的一个主题应用程序提供了一个案例研究,该案例研究捕捉了它在两年时间内的设计演变和200多次提交。我们的框架在许多这样的提交中发现了重构的机会,如果开发人员使用了像本文所介绍的这样的能量感知重构技术,这些机会本可以在开发阶段的早些时候实现。
{"title":"Automated Re-factoring of Android Apps to Enhance Energy-Efficiency","authors":"Abhijeet Banerjee, Abhik Roychoudhury","doi":"10.1145/2897073.2897086","DOIUrl":"https://doi.org/10.1145/2897073.2897086","url":null,"abstract":"Mobile devices, such as smartphones and tablets, are energy constrained by nature. Therefore, apps targeted for such platforms must be energy-efficient. However, due to the use of energy oblivious design practices often this is not the case. In this paper, we present a light-weight re-factoring technique that can assist in energy-aware app development. Our technique relies on a set of energy-efficiency guidelines that encodes the optimal usage of energy-intensive (hardware) resources in an app. Given a prototype for an app, our technique begins by generating a design-expression for it. A design-expression can be described as a regular-expression representing the ordering of energy-intensive resource usages and invocation of key functionalities (event-handlers) within the app. It also generates a set of defect-expressions that are design-expressions representing the negation of energy-efficiency guidelines. A non-empty intersection between an app’s design-expression and a defect expression indicates violation of a guideline (and therefore, potential for re-factoring). To evaluate the efficacy of our re-factoring technique we analyzed a suite of open-source Android apps using our technique. The resultant re-factoring when applied reduced the energy-consumption of these apps between 3 % to 29 %. We also present a case study for one of our subject apps, that captures its design evolution over a period of two-years and more than 200 commits. Our framework found re-factoring opportunities in a number of these commits, that could have been implemented earlier on in the development stages had the developer used an energy-aware re-factoring technique such as the one presented in this work.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Towards Cooperative Content Downloading for Resource-Constrained Mobile Devices 面向资源受限移动设备的协同内容下载
David Kaguma, Samuel Karumba, Aisha Walcott-Bryant, Komminist Weldemariam
Mobile devices often operate in resource constrained envi- ronments with intermittent connectivity, bandwidth, bat- tery power, etc. On these devices, existing cooperative con- tent sharing protocols and models (e.g. Peer to Peer and client-server) present major drawbacks. Presently, a user has to maintain the connection between the peers when down- loading content. For instance, when a large multimedia file is to be downloaded and the user has limited resources the corresponding content acquisition is constrained. This can easily lead to poor user experience. In this paper, we present the design of a resource-aware cooperative content down- loading system for low-cost mobile devices. We propose a novel combination of computed resource level, reliability in- dex, and segment determination to cooperatively download, aggregate and distribute downloaded chunks. The ability to improve resource utilization for low-end devices while coop- eratively scheduling to download content is also discussed. Finally, we end this paper by reporting experimental results illustrating the merits of the system.
移动设备通常在资源受限的环境中运行——间歇性连接、带宽、电池电量等。在这些设备上,现有的协作内容共享协议和模型(例如点对点和客户端-服务器)存在主要缺陷。目前,用户在下载内容时必须保持对等体之间的连接。例如,当要下载一个大型多媒体文件,而用户的资源有限时,相应的内容获取受到限制。这很容易导致糟糕的用户体验。本文提出了一种基于低成本移动设备的资源感知协同内容下载系统的设计。我们提出了一种计算资源水平、可靠性索引和段确定的新组合,以协同下载、聚合和分发下载的块。本文还讨论了协同调度下载内容时提高低端设备资源利用率的能力。最后,我们通过实验结果来说明系统的优点。
{"title":"Towards Cooperative Content Downloading for Resource-Constrained Mobile Devices","authors":"David Kaguma, Samuel Karumba, Aisha Walcott-Bryant, Komminist Weldemariam","doi":"10.1145/2897073.2897083","DOIUrl":"https://doi.org/10.1145/2897073.2897083","url":null,"abstract":"Mobile devices often operate in resource constrained envi- ronments with intermittent connectivity, bandwidth, bat- tery power, etc. On these devices, existing cooperative con- tent sharing protocols and models (e.g. Peer to Peer and client-server) present major drawbacks. Presently, a user has to maintain the connection between the peers when down- loading content. For instance, when a large multimedia file is to be downloaded and the user has limited resources the corresponding content acquisition is constrained. This can easily lead to poor user experience. In this paper, we present the design of a resource-aware cooperative content down- loading system for low-cost mobile devices. We propose a novel combination of computed resource level, reliability in- dex, and segment determination to cooperatively download, aggregate and distribute downloaded chunks. The ability to improve resource utilization for low-end devices while coop- eratively scheduling to download content is also discussed. Finally, we end this paper by reporting experimental results illustrating the merits of the system.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XD (Exchange-Deliver): A Middleware for Developing Device-to-Device Mobile Applications XD(交换交付):用于开发设备到设备移动应用程序的中间件
T. Kalbarczyk, C. Julien
In this demonstration, we showcase the XD middleware, a framework for expressive multiplexing of application communication streams onto underlying device-to-device communication links. XD allows applications to remain agnostic about which low-level networking stack is actually delivering messages and instead focus on the application-level content and delivery parameters. The IoT space has been flooded with new communication technologies (e.g., BLE, ZigBee, 6LoWPAN) to add to those already available on modern mobile devices (e.g., BLE, WiFi-Direct), substantially increasing the barrier to entry for developing innovative IoT applications. XD presents application developers with a simple publish-subscribe API for sending and receiving data streams, unburdening them from the task of selecting and coordinating communication channels. Our demonstration shows two Android applications, Disseminate and Prophet, running using our XD middleware for communication. We implemented BLE, WiFi Direct with TCP, and WiFi Direct with UDP communication stacks underneath XD.
在本演示中,我们将展示XD中间件,这是一个用于将应用程序通信流表达为多路复用到底层设备到设备通信链路的框架。XD允许应用程序不知道哪个低级网络堆栈实际在传递消息,而是专注于应用程序级的内容和传递参数。物联网领域已经充斥着新的通信技术(例如,BLE, ZigBee, 6LoWPAN),再加上现代移动设备上已有的技术(例如,BLE, WiFi-Direct),大大增加了开发创新物联网应用的进入门槛。XD为应用程序开发人员提供了一个简单的发布-订阅API,用于发送和接收数据流,将他们从选择和协调通信通道的任务中解脱出来。我们的演示展示了两个Android应用程序,传播和先知,使用我们的XD中间件进行通信。我们在XD下实现了BLE、WiFi Direct和TCP,以及WiFi Direct和UDP通信堆栈。
{"title":"XD (Exchange-Deliver): A Middleware for Developing Device-to-Device Mobile Applications","authors":"T. Kalbarczyk, C. Julien","doi":"10.1145/2897073.2897706","DOIUrl":"https://doi.org/10.1145/2897073.2897706","url":null,"abstract":"In this demonstration, we showcase the XD middleware, a framework for expressive multiplexing of application communication streams onto underlying device-to-device communication links. XD allows applications to remain agnostic about which low-level networking stack is actually delivering messages and instead focus on the application-level content and delivery parameters. The IoT space has been flooded with new communication technologies (e.g., BLE, ZigBee, 6LoWPAN) to add to those already available on modern mobile devices (e.g., BLE, WiFi-Direct), substantially increasing the barrier to entry for developing innovative IoT applications. XD presents application developers with a simple publish-subscribe API for sending and receiving data streams, unburdening them from the task of selecting and coordinating communication channels. Our demonstration shows two Android applications, Disseminate and Prophet, running using our XD middleware for communication. We implemented BLE, WiFi Direct with TCP, and WiFi Direct with UDP communication stacks underneath XD.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"151 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding Code Smells in Android Applications 理解Android应用程序中的代码气味
Umme Ayda Mannan, Iftekhar Ahmed, Rana Abdullah M. Almurshed, Danny Dig, Carlos Jensen
Code smells are associated with poor coding practices that cause long-term maintainability problems and mask bugs. Despite mobile being a fast growing software sector, code smells in mobile applications have been understudied. We do not know how code smells in mobile applications compare to those in desktop applications, and how code smells are affecting the design of mobile applications. Without such knowledge, application developers, tool builders, and researchers cannot improve the practice and state of the art of mobile development.We first reviewed the literature on code smells in Android applications and found that there is a significant gap between the most studied code smells in literature and most frequently occurring code smells in real world applications. Inspired by this finding, we conducted a large scale empirical study to compare the type, density, and distribution of code smells in mobile vs. desktop applications. We analyze an open-source corpus of 500 Android applications (total of 6.7M LOC) and 750 desktop Java applications (total of 16M LOC), and compare 14,553 instances of code smells in Android applications to 117,557 instances of code smells in desktop applications. We find that, despite mobile applications having different structure and workflow than desktop applications, the variety and density of code smells is similar. However, the distribution of code smells is different – some code smells occur more frequently in mobile applications. We also found that different categories of Android applications have different code smell distributions. We highlight several implications of our study for application developers, tool builders, and researchers.
代码气味与导致长期可维护性问题和掩盖bug的不良编码实践有关。尽管移动是一个快速增长的软件部门,但移动应用程序中的代码气味一直没有得到充分的研究。我们不知道移动应用程序中的代码气味与桌面应用程序中的代码气味相比如何,也不知道代码气味如何影响移动应用程序的设计。没有这些知识,应用程序开发人员、工具构建者和研究人员就无法改进移动开发的实践和状态。我们首先回顾了有关Android应用程序中代码气味的文献,发现文献中研究最多的代码气味与实际应用程序中最常见的代码气味之间存在显著差距。受此发现的启发,我们进行了一项大规模的实证研究,以比较移动和桌面应用程序中代码气味的类型、密度和分布。我们分析了500个Android应用程序(总共6.7M LOC)和750个桌面Java应用程序(总共16M LOC)的开源语料,并比较了Android应用程序中的14,553个代码气味实例和桌面应用程序中的117,557个代码气味实例。我们发现,尽管移动应用程序的结构和工作流程与桌面应用程序不同,但代码气味的种类和密度是相似的。然而,代码气味的分布是不同的——一些代码气味在移动应用程序中更频繁地出现。我们还发现,不同类别的Android应用程序有不同的代码气味分布。我们为应用程序开发人员、工具构建者和研究人员强调了我们的研究的几个含义。
{"title":"Understanding Code Smells in Android Applications","authors":"Umme Ayda Mannan, Iftekhar Ahmed, Rana Abdullah M. Almurshed, Danny Dig, Carlos Jensen","doi":"10.1145/2897073.2897094","DOIUrl":"https://doi.org/10.1145/2897073.2897094","url":null,"abstract":"Code smells are associated with poor coding practices that cause long-term maintainability problems and mask bugs. Despite mobile being a fast growing software sector, code smells in mobile applications have been understudied. We do not know how code smells in mobile applications compare to those in desktop applications, and how code smells are affecting the design of mobile applications. Without such knowledge, application developers, tool builders, and researchers cannot improve the practice and state of the art of mobile development.We first reviewed the literature on code smells in Android applications and found that there is a significant gap between the most studied code smells in literature and most frequently occurring code smells in real world applications. Inspired by this finding, we conducted a large scale empirical study to compare the type, density, and distribution of code smells in mobile vs. desktop applications. We analyze an open-source corpus of 500 Android applications (total of 6.7M LOC) and 750 desktop Java applications (total of 16M LOC), and compare 14,553 instances of code smells in Android applications to 117,557 instances of code smells in desktop applications. We find that, despite mobile applications having different structure and workflow than desktop applications, the variety and density of code smells is similar. However, the distribution of code smells is different – some code smells occur more frequently in mobile applications. We also found that different categories of Android applications have different code smell distributions. We highlight several implications of our study for application developers, tool builders, and researchers.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124588182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
idb: A Tool for Blackbox iOS Security Assessments idb:黑盒iOS安全评估工具
D. Mayer
Smartphones and mobile apps are increasingly used to manage and store sensitive data by both corporations and individuals. In this paper, common iOS mobile application flaws are reviewed as seen in real-world applications. For each type of flaw, defenses are recommended and it is shown how the author's tool 'idb' can be used to efficiently test for a range of these application flaws. The idb tool is open source and available to the public.
智能手机和移动应用程序越来越多地被企业和个人用于管理和存储敏感数据。在本文中,常见的iOS移动应用程序的缺陷进行了审查,并在实际应用中看到。对于每种类型的缺陷,都推荐了防御措施,并展示了如何使用作者的工具“idb”来有效地测试这些应用程序缺陷的范围。idb工具是开源的,对公众开放。
{"title":"idb: A Tool for Blackbox iOS Security Assessments","authors":"D. Mayer","doi":"10.1145/2897073.2897710","DOIUrl":"https://doi.org/10.1145/2897073.2897710","url":null,"abstract":"Smartphones and mobile apps are increasingly used to manage and store sensitive data by both corporations and individuals. In this paper, common iOS mobile application flaws are reviewed as seen in real-world applications. For each type of flaw, defenses are recommended and it is shown how the author's tool 'idb' can be used to efficiently test for a range of these application flaws. The idb tool is open source and available to the public.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116262098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1